Feb. 21, 2024, 7:06 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Previously, we discussed a situation where the decompiler wrongly used a combined stack slot for two separate variables. We could solve it because each variable had a distinct stack location, so editing the stack frame to split them worked.


However, modern optimizing compilers can actually reuse the same stack location for different variables active at different times (e.g. in different scopes). Consider this example:


int __fastcall getval(char a1)
{
int v2; // [esp+0h] [ebp-4h] BYREF

if ( a1 )

{ …

can compilers decompiler editing handling location malware analysis reuse stack variable week

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Data Privacy Manager m/f/d)

@ Coloplast | Hamburg, HH, DE

Cybersecurity Sr. Manager

@ Eastman | Kingsport, TN, US, 37660

KDN IAM Associate Consultant

@ KPMG India | Hyderabad, Telangana, India

Learning Experience Designer in Cybersecurity (f/m/div.) (Salary: ~113.000 EUR p.a.*)

@ Bosch Group | Stuttgart, Germany

Senior Security Engineer - SIEM

@ Samsara | Remote - US